[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84662

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 11165 Download | Alert*

The host is installed with Oracle Java SE 6u95 or earlier, 7u80 or earlier or 8u45 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 6u95 or earlier, 7u80 or earlier or 8u45 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Libraries. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 7u80 or earlier, 8u45 or earlier or Java FX 2.2.80 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 6u95 or earlier, 7u80 or earlier, 8u45 or earlier or Java FX 2.2.80 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 6u95 or earlier, 7u80 or earlier, 8u45 or earlier or Java FX 2.2.80 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, Windows Vista, 7, 8 or 8.1 and is prone to a remote code execution vulnerability. A flaw is present in the application, which improperly handles specially crafted OpenType fonts. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

The host is installed with Adobe Shockwave Player before 12.1.9.159 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Shockwave Player before 12.1.9.159 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take complete control of an affected system.

The host is installed with Microsoft SQL Server 2008, 2008 R2, 2012 or 2014 and is prone to a remote code execution vulnerability. A flaw is present in the application, which incorrectly handles internal function calls to uninitialized memory. Successful exploitation could allow attackers to take complete control of an affected system.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1116

© 2013 SecPod Technologies